Security improvement in elliptic curve cryptography KE Abdullah, NHM Ali International Journal of Advanced Computer Science and Applications 9 (5), 2018 | 16 | 2018 |
Modified Blowfish Algorithm for Image Encryption using Multi Keys based on five Sboxes NHM Ali, SA Abead Iraqi Journal of Science 57 (4C), 2968-2978, 2016 | 11 | 2016 |
An Efficient audio encryption based on chaotic standard and logistic maps with 3D matrix NHMA Yussra Majid Hameed Journal of Theoretical and Applied Information Technology 96 (16), 5143-5152, 2018 | 10* | 2018 |
A secure enhancement for encoding/decoding data using Elliptic Curve Cryptography KE Abdullah, NHM Ali Iraqi Journal of Science, 189-198, 2018 | 9 | 2018 |
Text hiding in Color Images using the Secret Key Transformation Function in GF (2n) NHM Ali, AMS Rahma, AS Jamil Iraqi Journal of Science 56 (4B), 3240-3245, 2015 | 8 | 2015 |
Security Scheme Enhancement for Voice over Wireless Networks MC Firas Hazzaa , Antesar M. Shabut , Nada Hussein M. Ali Journal of Information Security and Applications 58, 13, 2021 | 7* | 2021 |
The Effect of Nodes Density on Real Time Traffic in Mobile Ad Hoc Network ES 21. Firas Hazzaa , Sufian Yousef , Nada H. Ali IEEE 12th International Conference on Global Security, Safety and …, 2019 | 7 | 2019 |
Random Key Permutation Stream Algorithm Based on Modified Functions in AES Algorithm N Ali, A Rahma, S Yousef, M Jaber International Journal of Engineering and Technology 4 (6), 367-373, 2014 | 5 | 2014 |
Using steganography techniques for implicit authentication to enhance sensitive data hiding RN Kadhum, NHM Ali International Journal of Nonlinear Analysis and Applications 13 (1), 3973-3983, 2022 | 4 | 2022 |
Enhanced RC5 Key Schedule Using One-Dimensional Cellular Automata for Audio File Encryption YM Hameed, NHM Ali Iraqi Journal of Science, 388-401, 2019 | 4 | 2019 |
A Byte-Oriented Multi Keys Shift Rows Encryption and Decryption Cipher Processes in Modified AES NM Ali, AMS Rahma, AM Jaber, S Yousef International Journal of Scientific & Engineering Research 5 (4), 953-955, 2014 | 4 | 2014 |
Encryption using dual key transformation based on creation of multi S-boxes in AES algorithm NHM Ali, AMS Rahma, AM Jaber International Journal of Computer Applications 83 (10), 2013 | 4 | 2013 |
Detecting similarity in color images based on perceptual image hash algorithm NHM Ali, ME Mahdi IOP Conference Series: Materials Science and Engineering 737 (1), 012244, 2020 | 3 | 2020 |
A secure cipher for the gray images based on the shamir secret sharing scheme with discrete wavelet haar transform RJ Toama, MN Hussein journal of,” Mech. of Contin. & Math. Sci 15 (6), 334-351, 2020 | 3 | 2020 |
Using Shape Representation to Design Panoraama Video System AS Jamil, AMS Rahma, NHM Ali Al-Mansour Journal 25 (1), 49-66, 2016 | 3 | 2016 |
Generating Streams of Random Key Based on Image Chaos and Genetic Algorithm FF Saleh, NHM Ali Iraqi Journal of Science, 3652-3661, 2022 | 2 | 2022 |
Lookup table algorithm for error correction in color images RA Abdulsattar, NHM Ali JOIV: International Journal on Informatics Visualization 2 (2), 63-67, 2018 | 2 | 2018 |
Data integrity enhancement for the encryption of color images based on CRC64 technique using multiple look-up tables NHM Ali, RA Abdul-Sattar Iraqi Journal of Science, 1729-1739, 2017 | 2 | 2017 |
DeepFake Detection Improvement for Images Based on a Proposed Method for Local Binary Pattern of the Multiple-Channel Color Space. MT Abdullah, NHM Ali International Journal of Intelligent Engineering & Systems 16 (3), 2023 | 1 | 2023 |
Detection of drones with YOLOv4 deep learning algorithm NHMA Ahmed S. Naseri International Journal of Nonlinear Analysis and Applications 13 (2), 2709-2722, 2022 | 1 | 2022 |